DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses,...

15
© 2008 Infoblox Inc. All Rights Reserved. © 2007 Infoblox Inc. All Rights Reserved. © 2008 Infoblox Inc. All Rights Reserved. DNS Security: New Threats, Immediate Responses, Long Term Outlook DNS Security: DNS Security: New Threats, Immediate New Threats, Immediate Responses, Long Term Outlook Responses, Long Term Outlook

Transcript of DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses,...

Page 1: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.© 2007 Infoblox Inc. All Rights Reserved.© 2008 Infoblox Inc. All Rights Reserved.

DNS Security:New Threats, Immediate Responses, Long Term Outlook

DNS Security:DNS Security:New Threats, Immediate New Threats, Immediate Responses, Long Term Outlook Responses, Long Term Outlook

Page 2: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

A Brief History of the Recent DNS Vulnerability

Dan Kaminsky discovers new way to exploit a long-known DNS vulnerability caused by poor randomization

March, 2008

Kaminsky briefs key stakeholders (CERT, ISC, major vendors), who agree on interim fix

July 8, 2008

CERT issues DNS cache poisoning advisory urging users to patch; Many vendors have patched code available; Exploit details not released; Kaminsky offers to reveal on 8/7 at Black Hat

July 21, 2008

Halvar Flake’s public speculations on the nature of exploit are confirmed, details widely distributed

TODAY

Less than 50% of DNS servers are patched.

DNS cache poisoning attacks are in the wild

Providers of DNS servers (ISC, Microsoft, Cisco, Infoblox, etc.) patch their code

Nearly all DNS implementations (BIND, Microsoft) are vulnerable

Page 3: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

What Do I Do?

1 Upgrade to the latest (patched) version of your name server� That is, the newest version that includes a patch for the new vulnerability

• ISC has a new version of BIND

• Microsoft has a new version of the Microsoft DNS Server

• Infoblox has a new version of NIOS

• And so on

� The patch actually addresses some other known vulnerabilities, too

� Concerned about patching (labor, DNS outages, errors, etc.)? • Understandable, but do it anyway!• It’s important, and it works

� >600 Infoblox customers have downloaded patched code since July 8, most have upgraded and are in production today

2 Restrict or disable recursion wherever possible1 Note: There can be issues with recursive DNS servers behind NAT/PAT

firewalls

3 Monitor and act quickly when attacks are ongoing4 Start working on a plan for DNSSEC

Page 4: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

DNS Best Practices Architecture is the Start:Redundancy, Resiliency, Serviceability

© 2007 Infoblox Inc. All Rights Reserved.

Page 5: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

Modern Approaches Make it Easier to Implement and Manage Best Practices DNS Architectures

� Hardened, secure platforms

� Integrated core network services: DNS, DHCP, IPAM, RADIUS, FTP/TFTP/HTTP, FTP, more…

� Built-in high availability

Admins, Help Desk, Security, etc.

� Centralized management, visibility &control

� One-touch disaster recovery

� One-touch patching & upgrades with no downtime

Appliance GridDNS Appliances

Page 6: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.© 2007 Infoblox Inc. All Rights Reserved.

Serviceability and Security go Hand in Hand

� “Serviceability needs to start becoming a more important purchasing metric.

� Serviceability is, ultimately, the measure of software flaw survivability”

• Dan Kaminsky

� Infoblox Grid Technology makes upgrading groups of DNS servers easy, fast and reliable– The Ultimate in serviceability

“Ok, that was too easy.

Much better than upgrading

BIND. Thanks!!!!”

- Michael L Hershberger, Armstrong

Page 7: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

Implementing a Hardened Forwarding Tier Provides a “DNS Firewall”, Protecting Internal Servers

Company1.com Company2.com Company3.com

< Authoritative DNS Servers

< Internal Clients

< DNS queries for public Internet

< Recursive DNS Queries

ISC BIND DNS Server

Microsoft DNS/DHCP

Server

Microsoft DNS/DHCP

Server

ISC BIND DNS Server

Attacker

Internal Microsoft and BIND servers >

DNS Firewall >

Thwarted cache poisoning attack > • Hardened, patched DNS

servers/appliances configured as forwarders protect internal systems

• HA pairs provide nonstop operation

• One-touch upgrades with no downtime makes patching easy

Page 8: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

Infoblox DNS Security Features Provid eVisibility & Response

� DNS Protocol Monitoring– Real-time reporting

� Attack alerts– Email/trap when attack profile

thresholds exceeded

� Attack mitigation – Limit DNS query rate by source

address and other parameters

Attack Threshold

Alert Trigger

Attack in Progress

XX

Page 9: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

Free Tools are Available to Support DNS System Testing and Assessment

� DNS Vulnerability Test– http://www.doxpara.com

� DNS Advisor (External) & DNS Advisor Pro (Internal)– http://www.infoblox.com/services/dns_advisor.cfm

� DNS Audit Guidelines– http://www.infoblox.com/library/dns-security-center.cfm

Page 10: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

Looking Forward: The Path to roll-out DNSSEC

� 2004-2005: Infoblox trials DNSSEC with US Governmen t agencies– Project put on hold because of lack of Interest

� 2007-2008: Infoblox re-connects with DNSSEC pioneer s– Steve Crocker www.dnssec-deployment.org

– Olaf Kolkman www.NLnetlabs.nl

– Staffan Hagnell www.iis.se– Cricket Liu, www.infoblox.com , Author of O’Reilly’s “DNS and BIND”

– Some end-users (primarily finance sector)

� Today: Infoblox works on a phased approach for prac tical DNSSEC rollout– DNSSEC in the Internet resolver (cacher/forwarder)

– Infoblox Grid as the front end DNSSEC authoritative server (secondary)

– Infoblox key management• Most challenging area in DNSSEC, together with last-mile and NSEC3 problem• Key distribution difficult (will be better when root and TLD’s sign their zones)• Current tools store the key online and lack monitoring/logging and scalability

– DISI, ZKT and DNSSEC-tools

Page 11: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

Why is deployment rate of DNSSEC <1%

� “DNSSEC is to complex to deploy”– The weapon with which to shoot oneself in the foot is not a pop-gun but a military

grade full automatic

� “The root will never get signed”� “There is no economy to push deployment”� “Cache poisoning can be mitigated by correctly impl ementing random

query ports and proper query ID”� “The specification is still a moving target”� “New technology; chicken and egg”� “Zone walking possibility”� “Automation for key rollover and distribution is no t fully available”� “Yes, .se TLD is signed, but what about my .com zon e than?”

Page 12: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

Implementing DNSSEC Requires a Complete Set of Standards, Tools and Processes

� RRsets signing algorithm? (RSA/SHA1 or DSA or …)

� TTL for all records in a RRset?

� How to store your private key?

� Signature (RRSIG) expiration time? (determines freq uency of re-signing)

� Key Management tools? (DISI, DNSSEC-tools or ZKT - n one scale well)

� Process for key certification by parent zone (DS) r ecords?

� Certification of .com zone?

� Chain of trust?

� DNSSEC-capable resolvers configured to ask for sign ed responses first?

� Handling of queries that don’t request signed respo nses?

� Application checks for DNSSEC signed responses (AD bit set)?

� Will resolvers configured to only accept signed res ponses?

� How to roll back to unsigned zones?

� ….????

Page 13: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

The role of DNS solution manufacturers

� Don’t just howl with wolfs� Be smart, do research and develop a practical solution and

process together with early adopters!� Define a technology roadmap that could deliver key el ements of a

practical DNSSEC solution and process. These element s include:

– Implementation of a DNS protocol engine that completely complies to all DNSSEC standards. RFC 4033, 4034, 4035 (eg. BIND 9.3.2, NIOS 4.2)

– Improved management tools to performing the administrative tasks related to DNSSEC

– Development of high-powered, high-capacity hardware platforms that handles the cryptographic DNSSEC computations.

Page 14: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

Summary

� New threats can arise for vulnerabilities once believ ed “impractical”to exploit

� News of a new exploit (and fix) can happen at any t ime –serviceability (fast updates) is crucial to close vul nerability windows

� Best practices architecture can reduce risk

� Automated systems speed patching and eliminate down time

� Everyone should do the following:� Limit/disable recursion� Don’t let internal devices directly query the Internet� Ensure sufficient DNS capacity� Update your software whenever a known vulnerability is found and patched

� Organizations like ISACA and ISSA can take a leading role in developing, promoting and verifying DNS best practice s

Page 15: DNS Security: New Threats, Immediate Responses, Long Term ... · New Threats, Immediate Responses, Long Term Outlook ... Infoblox DNS Security Features Provid e ... The role of DNS

© 2008 Infoblox Inc. All Rights Reserved.

References

� CERT Advisory VU800113http://www.kb.cert.org/vuls/id/800113ISC

� ISCwww.isc.org

� DNS Cache Poisoning Testwww.doxpara.com

� DNS Best Practices White Paperhttp://www.infoblox.com/library/whitepapers.cfm

� DNS Advisor, Advisor LE, and Advisor Prohttp://www.infoblox.com/services/DNS_advisor.cfm

� DNS Audit Guidelines http://www.infoblox.com/library/DNS-security-center .cfm